Search Results for: phishing Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Blog Post McMenamins Suffered a Conti Ransomware Attack February 2, 2022 In mid-December 2021, pub and hotel chain McMenamins suffered a Conti ransomware attack that disrupted several of its computer systems.... Blog Post Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to... Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and...
Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Blog Post McMenamins Suffered a Conti Ransomware Attack February 2, 2022 In mid-December 2021, pub and hotel chain McMenamins suffered a Conti ransomware attack that disrupted several of its computer systems....
Blog Post Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to...
Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...